Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 18:01
Static task
static1
Behavioral task
behavioral1
Sample
4acb13192dbe908c55fdea6feef7c58e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4acb13192dbe908c55fdea6feef7c58e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4acb13192dbe908c55fdea6feef7c58e_JaffaCakes118.html
-
Size
52KB
-
MD5
4acb13192dbe908c55fdea6feef7c58e
-
SHA1
3c805f098f829413dc444426dfb940a9ca95ee5d
-
SHA256
46608a4278117e1d35fd62eb2056b0667d6b4f7164007d477791573cf0e15ae6
-
SHA512
45fe93ba6ef2dbdcf4c88557514668e7b608c37608ac1f37351ff0be30136c1e79a2a204fc8c160898e87bfe990c4455efe8116618be4d49019002a5fd823400
-
SSDEEP
1536:GbV5+x295ycAKveGB8vHLWu/0BHzxnrYjAJAVGcY8qOQXta1ddKML:Go295ycAKveGB8fLWseSMWVR
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e053221fe1d6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000017ca4273ddfd7d58194461b751ed12678738b2af9025eea2fb066d77f103f0c8000000000e8000000002000020000000eb61061f14c3ddef7abb588e90114230ba68e2b2b2001dd5f1fe962d4d9567b5200000001233565e1344b71b8bbe44f2ad17955b0e23db3ebb0c6caf6da3e535238362024000000028a5f8575221e96c47e69ac19091ca0394e146d761d1b872edfa2c7a4d66edd440fb884bca18e10b134e303282207ccac9ac155e9dcec3f66ec32b7967e31ce0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{482A89B1-42D4-11EF-91EE-7699BFC84B14} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427228366" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 756 iexplore.exe 756 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 756 wrote to memory of 2528 756 iexplore.exe 30 PID 756 wrote to memory of 2528 756 iexplore.exe 30 PID 756 wrote to memory of 2528 756 iexplore.exe 30 PID 756 wrote to memory of 2528 756 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4acb13192dbe908c55fdea6feef7c58e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:756 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb92fbb30e86a2283f0efc2b6f7272b1
SHA1fee3ef31f96bd546662d2ec79b834922d69dbc79
SHA2561d212e5906d8af251bc5b8f0e44fb5ea40bd67f86b9f1fcb6605bd8693281d08
SHA5123ffd0d145b2eea11af29b03d360ef5554a84dccf346142f043cab509051cbeb1cd20452bd0ac502d2649079fe97e5fce0ed0f2b70a9ab5acd8f92ec89d0fc132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9546896ee3138fd950aef0088a42601
SHA1155e9b9b37a5fd1bd084c8ff525bec657ffb6c74
SHA25697a037da2f8d25238369a3c88f20f2f9187a8536c505b7df109e8c95c3d0647f
SHA51257532a6d5c063b8dea8241b417ee9bfc88bb77d9594a954c9a74d114f12323c74cf300b406c347c377ed4448078f3c2daa5dd2ac6c9b033727750664fda87dfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fb403cb5d28374021513d85b761239f
SHA153e45bcf0e26e689f38aa6b64fe7ccaeebe69a58
SHA2567196a26f56d328679f14278985cd3bf94b6cadcbb9cf6234d6dfd113ab1b437d
SHA51237d4432e5e7d0759d137e8c4697eade6fb9cf8002f2ca01f9de57def333ef5f9ab4c939326b5e5491b45a956a6cb5eb7d5277ffbc5fd55790f9ea6d1330f5470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588e59e5688d043f1b9918e2b9ea21637
SHA15e947c9c7ded90715721e444c694454009218d15
SHA256f9c052808437f66adb0a3d6af99a9f37283b02362d72d0ba89e3d06593c95583
SHA512c06b7ed93c19289d90df168b400bc2594aa195b3258446e90a65b93f448f9e131c58a33ef0980b326ec807ecc1c0a2de3e5694b716447cab353084358bb175cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5455e8e89ede2db5d9ec69161b90e82f3
SHA13001f9944f8da07413ef046b909be787b22ebc94
SHA256b2098a702b7d49bf697ed76a1b7da77314cbd610225659a9804a8092c8b3af18
SHA512b96090afc15e39f841f075bfdd012d02d371fc110292b2ad577ff676575709de0babff7fde7290f8f865ceab76e8e7220a408a5cb18ee2161973e0f9cc834a1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e29fe75c94d57cf8a636c07fc499e376
SHA10ace34532c51c050930cb7e2c4a360058774cf2c
SHA256106370e86e2564d7c9a8c6768e30ebdac229af3ec8da49ad91b84d3920e72f06
SHA512b4bdc75350dd156c61edda11660262c4b21d5f47ab267ce0c64dda16991739e9dd4e969b750d87be64b9d598350757d9012ec08e353102818e74a54f4275662a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec0b1d0dc4923de47afdd5307772f46b
SHA1a895a17b34242f0019c4ffc0c11b16bacfec7438
SHA2564d96e4c7a3ca6b420d184c0e4707a5063ee1c84bbcefaa9ee1cb9982e26bed7e
SHA512f0260e87af28bc92bdfe398f475ec3ea2a6985b552eb9ca4084e4d2f933a2e7fee20a383859826b46f51816205644a0df53dca7b3724fecb999302b74b613e06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1e11834c3b68f44952b694f890c2e9c
SHA1078a24d99da9878ba3fbf75fb0051c57d8d595a9
SHA256dac430738d8943ae130d274eee80ea501c97650eb3672cac2bb5210562195a2e
SHA51246bb6f649b83c39126a9455de3bf162eb6243c573c2284e54aafe55b8ef5abf02db6abc546b1138164741d8e836de1f06fe17d8a16182864faecdf7efdfd7af1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6f88a7246fb584a5f25e903ebe66b20
SHA1792a5d80177a4d435ae5d00649ecb2c8134a3b87
SHA2566b06119799d62b4c325cbb496b1414d40c28c1ff9170fa32eb16f71fdf085ddb
SHA512a365682b51bb743877234879668eaf7d10fae696dc0c7227b63bc3ee459b42949a3790dc6b939c67337c56d5da8b42f33f73e8d2997e7f30fe8035ba64c29abe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588e43fcdc3503e9bb28c398986247b92
SHA1cf7a027732c583e82db130905b0dd10eb42dba78
SHA256838286f386d019a3a05fc59a511ab455e1a13ffac3d6658fa46d6da6312d48cd
SHA51233b916dae174eac07f88e3d83cba5f3c06545774f2c7faac1d5949a6ef2d4c420aab3ca6e253e16af799099de5b08ac698011c4d7868ab1b173c92627b3b6f8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d66745d7ea5c6d84386411b272f1e8b0
SHA1e2563cc56846d5a1b07151759205a87819965bec
SHA256aafa75e3068c2510e6c65e7bea5801b3080cad130d19e17c54086881cb37aa99
SHA512b26a8e82110fd6261e958cdaf5799434fccc902b0a1f208e8912401537ecd970f8250b07cf291022399ef62dc575d7a215eeffef1c7b1060d448932436d9243c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cc5cf8863f89123e1a35b3de445b621
SHA10445a7107a2596dfefd24cc59660d82a08ad7c10
SHA2563935f7227a5b18466c0c3c6fe52ad19ec29e7978f6fc9b2ddc6fbeabb44484b2
SHA51296014d69b6b4176e616b012d9dd506f453b44e630c2b7cde330f59aa2a32c4fea47befd8f15531ca4e8c7e9c249a147f5309a72e1bb2e38ecf9ed113c383f969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553ab5d449157a81f449f4369502dfe63
SHA12ac2143fb91e24f9e695de3a0da600cca2827893
SHA2567ae50e1a313a6d099fc68079f0af4c6dc9e0ef5a5e8a4fe96170c55d0d51b101
SHA5127096acb3f40dc21a40ed027315d45fc39745305bc1eea6985e3c2e8c8a019e4a647866c3bbfad407646049eb53a6c9114b32c93bf6331a52eaaf56b5c14c9694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edef998313fddab0c63618df5dd636aa
SHA145491551c3fb60f2e8cd7b31891e978fd89e69f7
SHA256a31f7942a217aa5673d0331883e60a815b3d8942b51227dcdd7bc744b2418a7d
SHA51215994ce8fda9d9a27fdba855ceb9b85522271908b552343d615f585a8c224b7ee475668bb35a7a8f26df6d5e38b763cf2487b103fdeee531c8c3ad8c2433559e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf3d7bfbbe23b9e81bcae33397f1b167
SHA1eb35397cf249b6c90cc31b64ba8e9523359bf55c
SHA256e0c94929ff5abf18f94e4845856f495faf54ad089aef82903e14c52d90cdcb7e
SHA5122a1f5d4cfdfbfc2f0201c28d98ff5ba72c0674d5589f0e9f27f0d6c1871efdac082e6846370bf90017e09d24ad457420b49c71e4a514f340b1654613b724dc31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb4d71a3b3e9ce33db23e0abe64d00b6
SHA105b6a42757b28ef1e884a85dd249a60613d5c7d6
SHA256e0deea103fd11c6e73dc97a2c44b22c6fe13f0a9bf52c2939ca9d95bfe54d2ac
SHA512b3a499d4483e2763d0fbd6a916c29bec7ad0770e7b331d0ee5f76d03a1e4a924186ffaa294e91bcc83878240dac4814315e1d7a5567b5b78476ce8bae1076126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a9e08e5c5715755e92d08eb644f53a9
SHA1121b0dcc22bdce1ad1e69041d0bb39efda5e0c3b
SHA25687f5aaf7d0948f99e00e8a633ac7c5b2a3d8e693314c29c3d0ac85e1168d0080
SHA512de0d875ba7a3304867b0de2b560cfcfa939c3f3d5909539f261e5b9597268fff326700c0f483a9e87986c66869032f4885932ee296f604021a7f124e8dd452d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5133c3ca5476acc5409b39fdafcea85ce
SHA1f0cf6f7941ea39405cdc534428b1004e24882469
SHA256e993e4f21a448c6af09f3519970f882733fe38c9e8427b8ff02dad96abfc47d3
SHA512894812d030f44d7d51b4adba48cacd35c8b3c7be9940ea330fbcf5bc4b99a2add80a4cb2d2e7a8c88cf1cf1f2fd02449832f916eb55626d24633a5b043105abf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5370f58dd0ff9a6c7668121619388ab3b
SHA1fdcb025f7abdeb4d081bc770e801b1ad2db833c9
SHA256b85ff1544b918516ac62e262d408d65cac22b218cc9277fcb9fbbd611d6f36df
SHA5126e4a9e594ffae69ffa7a011fc5c66bf5ef74d407b0e177cf74427e2a961dbcf9482508b6813510bd64fb41ea05b44b5df9e24dac08201718a59f9679c5240627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcd1251bf822f2f027b8f72c3268fed0
SHA1bbb2292b7cd4ad9c244e952a874063be56f025ee
SHA2568a575bb40d88e2a824fdcf4b265d68ab7774d6cdc5c4421b5d81ea15acff3667
SHA512c3b3c9d550dcfb20957a618ac169ca5fd2195a72a37547993fa41536ea9d65899c8c08a004f71f718a3d92b4d7982b317c3fda79086137d5ef8d7b5dc7bb90c0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VCY0HBA7\sale_form[1].js
Filesize761B
MD564f809e06446647e192fce8d1ec34e09
SHA15b7ced07da42e205067afa88615317a277a4a82c
SHA256f52cbd664986ad7ed6e71c448e2d31d1a16463e4d9b7bca0c6be278649ccc4f3
SHA5125f61bbe241f6b8636a487e6601f08a48bffd62549291db83c1f05f90d26751841db43357d7fe500ffba1bc19a8ab63c6d4767ba901c7eded5d65a1b443b1dd78
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b